Eigenschap:Grondslag

Uit NORA Online
Naar navigatie springen Naar zoeken springen
Kennismodel
:
Type eigenschap
:
Tekst
Geldige waarden
:
Meerdere waarden toegestaan
:
Nee
Weergave op formulieren
:
Tekstvak
Initiële waarde
:
Verplicht veld
:
Nee
Toelichting op formulier
:
de brondocumenten en hun uitspraken die zijn uitgewerkt in de huidige uitspraak. Notatiewijze: op elke regel sterretje, naam van brondocument, dubbelepunt, spatie, plek in het document, puntkomma, tweede plek in het document (etc.)
Subeigenschap van
:
Geïmporteerd uit
:
Formatteerfunctie externe URI
:

Klik op de button om een nieuwe eigenschap te maken:


Showing 500 pages using this property.
(
* The Standard of Good Practice for Information Security 2018: SD2.4.3   +
* CIP-netwerk   +
A
* The Standard of Good Practice for Information Security 2018: PM2.2 en PM2.3   +
* ISO 27002 2017: 9.1.1   +
* The Standard of Good Practice for Information Security 2018: SG2.1.2   +
* The Standard of Good Practice for Information Security 2018: SG 2.1.3 en SG 2.1.6   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.4.3.1   +
* Grip op Secure Software Development: SSD-30/01.03   +
* The Standard of Good Practice for Information Security 2018: SD2.4.1   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: 07.11   +
* CIP-netwerk   +
The Standard of Good Practice for Information Security 2018: SD 1.1.9  +
* NEN-ISO/IEC 27005:2018 (Information security risk management): 12.2   +
* The Standard of Good Practice for Information Security 2018: NC1.3.5   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.2.5.3   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.07.09   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.1.1   +
* The Standard of Good Practice for Information Security 2018: S12.6   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.2.4   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.2.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.2.7   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: U/WA.09.01   +
* The Standard of Good Practice for Information Security 2018: SD2.1   +
* The Standard of Good Practice for Information Security 2018: SD2.4a en d   +
* CIP-netwerk   +
* CIP-netwerk   +
*OWASP Application Security Verification Standard 4.0.2: V13   +
* NEN-EN-ISO/IEC 27040:2016 (Storage security): 6.7.1   +
*Grip op Secure Software Development: SSD-5 *SIG Evaluation Criteria Security - Guidance for producers: 3.2.3   +
* The Standard of Good Practice for Information Security 2018: TS2.2   +
* Grip op Secure Software Development: SSD-12/02.01   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.4.1   +
* Grip op Secure Software Development: SSD-7   +
* The Standard of Good Practice for Information Security 2018: SA1.2.1   +
* CIP-netwerk   +
* The Standard of Good Practice for Information Security 2018: PM2.1.1 en PM2.3   +
B
* BIO (Baseline Informatiebeveiliging Overheid): 12.1.1   +
BIO (Baseline Informatiebeveiliging Overheid): 17.1.2  +
* BIO (Baseline Informatiebeveiliging Overheid): 17.2.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 8.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.2.5   +
* BIO (Baseline Informatiebeveiliging Overheid): 6.2.2   +
* BIO (Baseline Informatiebeveiliging Overheid): 6.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.2.3   +
* BIO (Baseline Informatiebeveiliging Overheid): 13.2.1   +
* BIO 2019 13.2.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 12.3.1.1, 12.3.1.2, 12.3.1.4, 12.3.1.5   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.2.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.2.1   +
* Cloud Computing Compliance Criteria Catalogue - C5:2020: BCM-01   +
ISO 27002 2017: 15.2.1b  +
* BIO (Baseline Informatiebeveiliging Overheid): 18.2.3   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.2.5   +
* CIP-netwerk   +
* Grip op Secure Software Development: SSD-30/03.01   +
* BIO (Baseline Informatiebeveiliging Overheid): 12.6.2   +
* BIO (Baseline Informatiebeveiliging Overheid): 12.6.2   +
*ISO 27002 2017: 14.2.4   +
* SIG Evaluation Criteria Security - Guidance for producers: 3.2.3   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.3.1   +
* NEN-ISO/IEC 27017:2015 (Code of practice for information security controls based on ISO/IEC 27002 for cloud services): 12.6.1   +
* Cloud Computing Compliance Criteria Catalogue - C5:2020: BCM-03   +
* NEN-ISO 31000:2018 (Risicomanagement - Richtlijnen): 6.1   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: B.06.05   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.09.01   +
* Cloud Computing Compliance Criteria Catalogue - C5:2020: BCM-04   +
* BIO 2019: 17.2.1   +
* Cloud Computing Compliance Criteria Catalogue - C5:2020: 3.4.4.1   +
* NEN-ISO/IEC 27017:2015 (Code of practice for information security controls based on ISO/IEC 27002 for cloud services): 5.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.4.2   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.2.6   +
* AVG: Art. 32 * UAVG (Uitvoeringswet AVG): MvT § 5.2.4   +
* BIO 2019: 13.2.3, 14.1.3   +
* NIST SP 800-160 2016 (Systems Security Engineering): 2.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 13.1.2   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.1.3   +
* The Standard of Good Practice for Information Security 2018: SM2.1   +
*OWASP Application Security Verification Standard 4.0.2: V12.3   +
* BIO (Baseline Informatiebeveiliging Overheid): 13.1.2.2   +
* The Standard of Good Practice for Information Security 2018: SY1.1.3   +
* BIO (Baseline Informatiebeveiliging Overheid): 13.1.2.1   +
* Focus Group on Cloud Computing Technical Report Part 5 - Cloud security: 8.8   +
* AVG: Art. 5 lid 1e * UAVG (Uitvoeringswet AVG): Art. 43   +
* The Standard of Good Practice for Information Security 2018: SM2.1.2   +
*OWASP Application Security Verification Standard 4.0.2: V12.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.4.1.2 * Grip op Secure Software Development: SSD-8/01.03   +
* The Standard of Good Practice for Information Security 2018: SD2.2.2   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.1.4.2   +
* BIO (Baseline Informatiebeveiliging Overheid): 13.1.2.3   +
* The Standard of Good Practice for Information Security 2018: IR2.2   +
C
* BIO 2019: 12.1.3   +
* Grip op Secure Software Development: SSD-30/01.01   +
* CIP-netwerk   +
* BIO (Baseline Informatiebeveiliging Overheid): 8.2.1   +
* The Standard of Good Practice for Information Security 2018: SG2.1   +
* CIP-netwerk   +
* CIP-netwerk   +
* NEN-ISO/IEC 27017:2015 (Code of practice for information security controls based on ISO/IEC 27002 for cloud services): 5.1.1   +
* Cloud Computing Compliance Criteria Catalogue - C5:2020: BCM-01   +
*Grip op Secure Software Development: SSD-4   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.03.04   +
* NEN-ISO/IEC 27002: 18.2.1 en 18.2.2   +
* The Standard of Good Practice for Information Security 2018: SI2.3.1 en SI2.3.2   +
* SoGP 2018: SY2   +
* Grip op Secure Software Development: SSD-4/03.04   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.10   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: B.05 en C.10   +
* BIO (Baseline Informatiebeveiliging Overheid): 10.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 10.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 10.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 18.1.5.1   +
* NEN-ISO/IEC 27033-1:2015 (Network security - Overview and concepts): 7.2.2.2   +
* CIP-netwerk   +
D
* ITU-T Part 5 2012: 8.5   +
* BIO (Baseline Informatiebeveiliging Overheid): 8.2.1   +
* BIO 2019: 12.3.1   +
* NEN-EN-ISO/IEC 27040:2016 (Storage security): 6.3.2.1   +
* NEN-EN-ISO/IEC 27040:2016 (Storage security): 7.7.4   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.1.1.1   +
* The Standard of Good Practice for Information Security 2018: SY1.2.1   +
* ISO 27002 2017: 12.6.1k   +
* BIO (Baseline Informatiebeveiliging Overheid): 12.2.1.3   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: U/WA.09.01   +
* The Standard of Good Practice for Information Security 2018: PM1.2.2   +
* ISO 27033-5 2013: 7   +
* The Standard of Good Practice for Information Security 2018: NC1.5.5   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.2.1.1   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C10.02   +
* CIP-netwerk   +
* BIO (Baseline Informatiebeveiliging Overheid): 12.2.1.5   +
* BIO (Baseline Informatiebeveiliging Overheid): 13.1.2.1   +
* ISO 27002 2017: 11.2.2a t/m e   +
* The Standard of Good Practice for Information Security 2018: SD2.4.3   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.2.5.2   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.1.4.1   +
* The Standard of Good Practice for Information Security 2018: SM2.1 * ISO 27001 2017: 5.3   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.09.03   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: B.06.07   +
* The Standard of Good Practice for Information Security 2018: SY1.2.3   +
* The Standard of Good Practice for Information Security 2018: SD 1.1.3   +
* ISO 27002 2017: 12.4.4 * The Standard of Good Practice for Information Security 2018: TM1.2.3   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.01.08   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.07.05   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: U/WA.09   +
* BIO (Baseline Informatiebeveiliging Overheid): 13.1.2.2   +
* Cloud Computing Compliance Criteria Catalogue - C5:2020: BCM-02   +
* AVG: Art. 5; 6; 9; 10; 22; 23 * UAVG (Uitvoeringswet AVG): Art. 22; 23; 24; 25; 26; 27; 28; 29; 30; 31; 32; 33; 40; 46   +
AVG: Art. 26; 27; 28; 29; 44; 45; 46; 47; 48; 49; 96  +
* CIP-netwerk   +
E
* BIO (Baseline Informatiebeveiliging Overheid): 12.4.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 12.4.1.2   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.09.05   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.4.2.2   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.2.1.1   +
* ISO 27002 2017: 8.1.2 * The Standard of Good Practice for Information Security 2018: PM1.2.3   +
* ISO 27002 2017: 8.1.2 * The Standard of Good Practice for Information Security 2018: PM1.2.3   +
* BIO (Baseline Informatiebeveiliging Overheid): 8.1.2   +
* ISO 27002 2017: 8.1.1 en 8.1.2 * The Standard of Good Practice for Information Security 2018: PM1.2   +
* The Standard of Good Practice for Information Security 2018: SY1.2.1   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.07.09   +
* ISO 27002 2017: 12.4.1a t/m e, g, h, l, m en n   +
* ISO 27002 2017: 11.1.6b   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.07.03   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.07.08   +
* ISO 27002 2017: 12.6.1g * The Standard of Good Practice for Information Security 2018: TM1.1.10   +
* ISO 27002 2017: 9.1.1 * NIST Special Publication 800-63B (Authentication and Lifecycle Management)   +
*The Standard of Good Practice for Information Security 2018: TS1.1.9a, c en d   +
* ISO 27002 2017: 12.4.3   +
* BIO (Baseline Informatiebeveiliging Overheid): 12.6.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 13.2.3   +
* ISO 27002 2017: 13.2.2a, b, i, j en k   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.2.5   +
BIO (Baseline Informatiebeveiliging Overheid): 15.2.1  +
* NEN-ISO/IEC 27033-1:2015 (Network security - Overview and concepts): 8.5   +
* NEN-ISO/IEC 27005:2018 (Information security risk management): 8.4   +
* CIP-netwerk   +
F
* CIP-netwerk   +
* CIP-netwerk   +
* BIO (Baseline Informatiebeveiliging Overheid): 6.1.2   +
* CIP-netwerk   +
* The Standard of Good Practice for Information Security 2018: SY1.3.4   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.1.2   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.1.1   +
G
* BIO (Baseline Informatiebeveiliging Overheid): 14.2.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.2.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.2.1.1   +
* ISO 27033-4 2014: 6   +
* SIG Evaluation Criteria Security - Guidance for producers: 3.3.6   +
* SIG Evaluation Criteria Security - Guidance for producers: 3.3.6   +
* Cloud Computing Compliance Criteria Catalogue - C5:2020: PI-01   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.4.1.2 * ISO 27002 2017: 9.1.1   +
BIO (Baseline Informatiebeveiliging Overheid): 9.4.1.2  +
* The Standard of Good Practice for Information Security 2018: SD2.4.3   +
*OWASP Application Security Verification Standard 4.0.2: V12.1   +
*OWASP Application Security Verification Standard 4.0.2: V12   +
*Grip op Secure Software Development: SSD-2   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.2.4   +
* Grip op Secure Software Development: SSD-14/01.02   +
* Focus Group on Cloud Computing Technical Report Part 5 - Cloud security: S12   +
* NEN-ISO/IEC 27005:2018 (Information security risk management): 7.4   +
* BIO (Baseline Informatiebeveiliging Overheid): 14.2.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.2.1.2   +
H
* BIO (Baseline Informatiebeveiliging Overheid): 10.1.2.1   +
* The Standard of Good Practice for Information Security 2018: SY1.2.5 en SY1.2.8   +
* Focus Group on Cloud Computing Technical Report Part 5 - Cloud security: S12   +
* ISO 27040 2016: 6.4.5   +
* NEN-ISO/IEC 27005:2018 (Information security risk management): 7.4   +
* BIO (Baseline Informatiebeveiliging Overheid): 12.4.1.5   +
* Cloud Computing Compliance Criteria Catalogue - C5:2020: PI-01   +
* The Standard of Good Practice for Information Security 2018: TM1.5.1   +
* The Standard of Good Practice for Information Security 2018: BC1.3.9   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.10.01   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: C.09.04   +
*ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: U/WA.09.01   +
* BIO (Baseline Informatiebeveiliging Overheid): 10.1.1.1 * The Standard of Good Practice for Information Security 2018: TS2.2   +
* ISO 27002 2017: 8.1.2 * The Standard of Good Practice for Information Security 2018: PM1.2.1   +
* ICT-Beveiligingsrichtlijnen voor Webapplicaties-Richtlijnen: B.05   +
* The Standard of Good Practice for Information Security 2018: TM1.1.6   +
* BIO (Baseline Informatiebeveiliging Overheid): 13.1.3.1   +
* The Standard of Good Practice for Information Security 2018: SD2.2.3   +
* The Standard of Good Practice for Information Security 2018: SY1.1.1   +
* The Standard of Good Practice for Information Security 2018: SD2.2.1   +
* The Standard of Good Practice for Information Security 2018: NC1.6.4   +
* The Standard of Good Practice for Information Security 2018: SY1.1.2c   +
* The Standard of Good Practice for Information Security 2018: SD 1.1.6   +
* The Standard of Good Practice for Information Security 2018: SA1.1.10   +
* CIP-netwerk   +
* BIO (Baseline Informatiebeveiliging Overheid): 5.1.1   +
* The Standard of Good Practice for Information Security 2018: SY1.3.5   +
I
* The Standard of Good Practice for Information Security 2018: BC1.3   +
* NEN-ISO/IEC 27017:2015 (Code of practice for information security controls based on ISO/IEC 27002 for cloud services): 18.1.1   +
* Grip op Secure Software Development: SSD-7/03.01   +
* ISO 27002 2017: 12.1.1a t/m f, i en j   +
* NEN-ISO/IEC 7498-4:1991 (Informatietechnologie - Onderlinge verbinding van open systemen (OSI) - Basisreferentiemodel - Deel 4 - Beheerskader): 4.5.1   +
* The Standard of Good Practice for Information Security 2018: TS1.1.5   +
* BIO (Baseline Informatiebeveiliging Overheid): 10.1.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 11.1.4   +
* BIO (Baseline Informatiebeveiliging Overheid): 8.2.1.1   +
* BIO (Baseline Informatiebeveiliging Overheid): 15.1.1   +
* ISO 27002 2017: 14.1.1   +
* AVG: Art. 13; 14; 15 * UAVG (Uitvoeringswet AVG): Art. 5; 22; 24; 27; 28; 32; 41   +
* NEN-ISO/IEC 27017:2015 (Code of practice for information security controls based on ISO/IEC 27002 for cloud services): 18.1.1   +
* OWASP Application Security Verification Standard 4.0.2: V12   +
* BIO (Baseline Informatiebeveiliging Overheid): 9.4.2   +
* Grip op Secure Software Development: SSD-19 en SSD-20   +